Applying Visual Cryptography to Enhance Text Captchas
Xuehu Yan,Feng Liu,Wei Qi Yan,Yuliang Lu +3 more
- Vol. 8, Iss: 3, pp 332
TLDR
Using the features of the randomness for each encoding process in visual cryptography and the visual recognizability with naked human eyes, VC is applied to design and enhance text-based captcha (VCETC), and the recognition rate is in some degree decreased.Abstract:
Nowadays, lots of applications and websites utilize text-based captchas to partially protect the authentication mechanism. However, in recent years, different ways have been exploited to automatically recognize text-based captchas especially deep learning-based ways, such as, convolutional neural network (CNN). Thus, we have to enhance the text captchas design. In this paper, using the features of the randomness for each encoding process in visual cryptography (VC) and the visual recognizability with naked human eyes, VC is applied to design and enhance text-based captcha. Experimental results using two typical deep learning-based attack models indicate the effectiveness of the designed method. By using our designed VC-enhanced text-based captcha (VCETC), the recognition rate is in some degree decreased.read more
Citations
More filters
Journal ArticleDOI
Deep-CAPTCHA: A Deep Learning Based CAPTCHA Solver for Vulnerability Assessment
TL;DR: This research investigates a way to crack visual CAPTCHA tests by an automated deep learning based solution and identifies some efficient techniques to improve the security of the CAPTCHAs, based on the performance analysis conducted on the Deep-CAPTCHA model.
Posted Content
Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment.
Zahra Noury,Mahdi Rezaei +1 more
TL;DR: This research investigates a way to crack visual CAPTCHA tests by an automated deep learning based solution and identifies some efficient techniques to improve the security of the CAPTCHAs, based on the performance analysis conducted on the Deep-CAPTCHA model.
Journal ArticleDOI
An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms
TL;DR: An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms, which includes an encryption and a decryption schemes for gray-scale and color secret images that can reconstruct the secret images with only a series of XOR operations.
Journal ArticleDOI
Secure Online Voting System using Visual Cryptography
TL;DR: In this paper, a secure online voting system using visual cryptography is proposed, where visual information can be encrypted on the user side, with the information decrypted on the admin side, which can be helpful in allowing participation in voting systems securely and ensuring fast vote counting and monitoring of the voting process.
Journal ArticleDOI
A Hybrid Visual Cryptography Method using Sigmoid Function for Security Enhancement in Gray Scale Images
TL;DR: This proposed HVMSF mainly tries to overcome the limitation of the previous approaches by applying sigmoid function in image feature space for contrast enhancement throughout the consequent source images.
References
More filters
Journal ArticleDOI
Gradient-based learning applied to document recognition
Yann LeCun,Léon Bottou,Léon Bottou,Yoshua Bengio,Yoshua Bengio,Yoshua Bengio,Patrick Haffner +6 more
TL;DR: In this article, a graph transformer network (GTN) is proposed for handwritten character recognition, which can be used to synthesize a complex decision surface that can classify high-dimensional patterns, such as handwritten characters.
Journal ArticleDOI
reCAPTCHA: Human-Based Character Recognition via Web Security Measures
TL;DR: This research explored whether human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize.
Journal ArticleDOI
Telling humans and computers apart automatically
TL;DR: In this paper, lazy cryptographers do AI and show how lazy they can be, and how they do it well, and why they do so poorly, and they are lazy.
Journal ArticleDOI
Encryption of pictures and shapes by random grids.
Oded Kafri,Eliezer Keren +1 more
TL;DR: A low-cost and simple technique for encryption of two-dimensional patterns and shapes based on the superposition of random grids is suggested and demonstrated.
Journal ArticleDOI
Halftone Visual Cryptography Via Error Diffusion
TL;DR: HVC construction methods based on error diffusion are proposed, where the secret image is concurrently embedded into binary valued shares while these shares are halftoned by error diffusion-the workhorse standard of halftoning algorithms.